# 4. Established a numbering process per new section, starting with #5000

# no particular reason for beginning at this number, random choice.

# 5. Changed the name of this publication from:

# "HUGE List of Security Blogs: Unix, Linux, Windows - part #"

# to: HUGE Security Resource version # - release date

################################################################

# Sections, version 6, 03/06/2012

#

# 5000: Wikipedia (all links here found within Wikipedia)

# 5001: Suggested Books

# 5002: Articles, Guides, How To's

# 5003: Antivirus LiveCDs - boot and scan your system for malware

# 5004: Random Links

# 5005: Security Blogs

# 5006: Security Forums (Web based Discussion Forums)

# 5007: Security Magazines & Zines

# n/a : Copy/paste inclusion of previous release

################################################################

** 5000: Wikipedia:

Acoustic cryptanalysis

- https://en.wikipedia.org/wiki/Acoustic_cryptanalysis

Advanced persistent threat

- https://en.wikipedia.org/wiki/Advanced_Persistent_Threat

ARP spoofing

- https://en.wikipedia.org/wiki/ARP_poisoning

ARP Watch

- https://en.wikipedia.org/wiki/Arpwatch

Category:Confidence_tricks

- http://en.wikipedia.org/wiki/Category:Confidence_tricks

Category: Cryptographic_attacks

- https://en.wikipedia.org/wiki/Category:Cryptographic_attacks

Category: Signals_intelligence

- https://en.wikipedia.org/wiki/Category:Signals_intelligence

Category: Surveillance

- https://en.wikipedia.org/wiki/Category:Surveillance

Chaffing and winnowing (cryptographic technique)

- https://en.wikipedia.org/wiki/Chaffing_and_winnowing

Cold boot attack

- https://en.wikipedia.org/wiki/Cold_boot_attack

CyanogenMod

- https://en.wikipedia.org/wiki/CyanogenMod

Deep packet inspection

- https://en.wikipedia.org/wiki/Deep_packet_inspection

DNS cache poisoning

- https://en.wikipedia.org/wiki/DNS_poisoning

Echelon (signals intelligence)

- https://en.wikipedia.org/wiki/ECHELON

Electromagnetic interference

- https://en.wikipedia.org/wiki/Electromagnetic_interference

Electromagnetic radiation and health

- https://en.wikipedia.org/wiki/Electromagnetic_radiation_and_health

Electromagnetic shielding

- https://en.wikipedia.org/wiki/Electromagnetic_shielding

EMF meter

- https://secure.wikimedia.org/wikipedia/en/wiki/EMF_Meter

Frequency counter

- https://en.wikipedia.org/wiki/Frequency_counter

High-frequency direction finding (electronics)

- https://en.wikipedia.org/wiki/HF/DF

I2P

- https://en.wikipedia.org/wiki/I2P

Laser microphone

- https://en.wikipedia.org/wiki/Laser_microphone

Linux malware

- https://en.wikipedia.org/wiki/Linux_malware

Nonverbal communication

- https://en.wikipedia.org/wiki/Nonverbal_communication

Operation RAFTER

"RAFTER was a code name for the MI5 radio receiver detection technique, mostly used against clandestine Soviet agents and monitoring of domestic radio transmissions by foreign embassy personnel from the 1950s on."

- https://en.wikipedia.org/wiki/Operation_RAFTER

Spycatcher: The Candid Autobiography of a Senior Intelligence Officer (also Spycatcher), is a book written by Peter Wright, former MI5 officer and Assistant Director, and co-author Paul Greengrass. It was published first in Australia. Its allegations proved scandalous on publication, but more so because the British Government attempted to ban it, ensuring its profit and notoriety.

- https://en.wikipedia.org/wiki/Spycatcher

Palantir Technologies, Inc., headquartered in Palo Alto, California, with offices in Tysons Corner, Virginia, New York City and Covent Garden, London, is a software company that produces the Palantir Government and Palantir Finance platforms. Palantir offers a Java-based platform for analyzing, integrating, and visualizing data of all kinds, including structured, unstructured, relational, temporal, and geospatial.

- https://en.wikipedia.org/wiki/Palantir_Technologies

Paralanguage refers to the non-verbal elements of communication used to modify meaning and convey emotion. Paralanguage may be expressed consciously or unconsciously, and it includes the pitch, volume, and, in some cases, intonation of speech. Sometimes the definition is restricted to vocally-produced sounds. The study is known as paralinguistics.

- https://en.wikipedia.org/wiki/Paralanguage

Power analysis

- https://en.wikipedia.org/wiki/Power_analysis

Project MINARET was a sister project to Project SHAMROCK operated by the NSA, which, after intercepting electronic communications that contained the names of predesignated US citizens, passed them to other government law enforcement and intelligence organizations.Intercepted messages were disseminated to the FBI, CIA, Secret Service, Bureau of Narcotics and Dangerous Drugs (BNDD), and the Department of Defense.

- https://en.wikipedia.org/wiki/Project_MINARET

Project SHAMROCK, considered to be the sister project for Project MINARET, was an espionage exercise, started in August 1945 that involved the accumulation of all telegraphic data entering into or exiting from the United States. The Armed Forces Security Agency (AFSA)and its successor NSA were given direct access to daily microfilm copies of all incoming, outgoing, and transiting telegraphs via the Western Union and its associates RCA and ITT.

- https://en.wikipedia.org/wiki/Project_Shamrock

Radio direction finder

- https://en.wikipedia.org/wiki/Radio_direction_finder

Scrambler - In telecommunications, a scrambler is a device that transposes or inverts signals or otherwise encodes a message at the transmitter to make the message unintelligible at a receiver not equipped with an appropriately set descrambling device.

- https://en.wikipedia.org/wiki/Scrambler

Secure communication

- https://en.wikipedia.org/wiki/Secure_Communication

Situation awareness

- https://en.wikipedia.org/wiki/Situation_awareness

Sysctl

- https://en.wikipedia.org/wiki/Sysctl

ThinThread is the name of a project that the United States National Security Agency engaged in during the 1990s, according to a May 17, 2006 article in the Baltimore Sun. The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued after the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority.

- https://en.wikipedia.org/wiki/ThinThread

Timing attack

- https://en.wikipedia.org/wiki/Timing_attack

Tradecraft is skill acquired through experience in a (typically clandestine) trade. Within the intelligence community this means the techniques used in modern espionage and generally, the activity of intelligence. This includes general topics or techniques (dead drops, for example), or the specific techniques of a nation or organization (the particular form of encryption used by the NSA, for example).

- https://en.wikipedia.org/wiki/Tradecraft

Trailblazer Project

Trailblazer was a United States National Security Agency (NSA) program intended to analyze data carried on communications networks like the internet. It was able to track communication methods such as cell phones and e-mail. It ran over budget, failed to accomplish several goals, and was cancelled.

When attackers get root access on a machine, a RootKit allows them to maintain that access by implementing a back door and hiding evidence of system compromise. Ed Skoudis shows how to avoid being RootKitted in this article.

- http://www.informit.com/articles/article.aspx?p=23463&rll=1

Anonymous Blogging with Wordpress & Tor - Global Voices Advocacy

- http://advocacy.globalvoicesonline.org/projects/guide/

Attacks on Package Managers

- http://www.cs.arizona.edu/stork/packagemanagersecurity/faq.html

0wning Vista from the boot; BIOS rootkit(s)

Federico Biancuzzi interviews Nitin and Vipin Kumar, authors of VBootkit, a rootkit that is able to load from Windows Vista boot-sectors.

The attacks last week by Anonymous on security firm HBGary have yanked back the curtain on the dark world of government-sponsored malware. Where does the US military get its custom rootkits? It buys them and the 0-day exploits that deliver them;from private security firms.

by Matthew Tanase Detecting and Removing Malicious Code by Matthew Tanase last updated July 22, 2002 Introduction Has it happened yet? The phone call, the e-mail, the page, or maybe you discovered it yourself.

UPDATE: Insider attacks and industrial espionage could become more stealthy by hiding code in the core system functions stored on the motherboard, researchers say.

- http://www.securityfocus.com/news/11372?ref=rss

Security - The Wireshark Wiki

- http://wiki.wireshark.org/Security

Setting Tripwire

How to Set up Tripwire, RedHat Linux

- http://www.alwanza.com/howTo/linux/tripwire.html

Industrial-strength Linux lockdown, Part 1

For technical and non-technical users alike, maintaining a large installed base of Linux machines can be a harrowing experience for an administrator. Technical users take advantage of Linux's extreme configurability to change everything to their liking, while non-technical users running amok within their own file systems. This tutorial is the first in a two-part series that shows you how and why to lock those machines down to streamline the associated support and administration processes. In this tutorial, you learn how to remove the interpreters from the installation base system.

- https://www.ibm.com/developerworks/linux/tutorials/l-lockdown1/

Industrial-strength Linux lockdown, Part 2

This tutorial, the second in a two-part series on locking your Linux machines down to streamline the associated support and administration processes, shows how to configure the Linux kernel to execute only signed binaries.

Ubuntu is one of many Linux distributions with support for LVM, the Linux Logical Volume Manager. LVM is a disk partitioning scheme that brings a level of flexibility to disk management that is not possible with the traditional method. With LVM, you can, if necessary, increase the size of a partition online, that is, while...

"This is an exploit for CVE-2011-1493, a remote stack overflow in the Linux implementation of the ROSE amateur radio protocol. THIS IS PROOF OF CONCEPT.It should work very reliably on the kernel I tested (Ubuntu Server 10.04), but I make no promises about other kernels. Obviously, any hard-coded addresses and offsets (in payload.h) must be adjusted for the targeted kernel."

- https://github.com/djrbliss/rose-exploit

Switzerland Network Testing Tool

# Is your ISP interfering with your BitTorrent connections? Cutting off your VOIP calls? Undermining the principles of network neutrality? In order to answer those questions, concerned Internet users need tools to test their Internet connections and gather evidence about ISP interference practices. After all, if it weren't for the testing efforts of Rob Topolski, the Associated Press, and EFF, Comcast would still be stone-walling about their now-infamous BitTorrent blocking efforts.

# Developed by the Electronic Frontier Foundation, Switzerland is an open source software tool for testing the integrity of data communications over networks, ISPs and firewalls. It will spot IP packets which are forged or modified between clients, inform you, and give you copies of the modified packets.

- https://www.eff.org/pages/switzerland-network-testing-tool

Ask Ubuntu - Ubuntu Q&A

- http://askubuntu.com/

OMG! Ubuntu! | Everything Ubuntu. Daily.

- http://www.omgubuntu.co.uk/

Trapkit.de

- http://trapkit.de/

InfoWorld.com

- https://www.infoworld.com/

RootzWiki is a community of Android enthusiasts, developers, themers, and experts. RootzWiki is formed by the community for the community. We pride ourselves on giving back to the people who make Android great: you. We regularly give phones to developers using a portion of the funds created by the advertisements you see here at RootzWiki. We do this to help ensure the Android world keeps on spinning. We love seeing all the amazing things that come from the community. You make this platform great. You make our phones great. We want to be your number one source for Android information, community, and, of course, free devices for developers.

BrickHouse Security is the Global Leader in Home Security, Cameras for Covert Video Surveillance & GPS Tracking. Government-Grade Home Security, Wireless Cameras, & Spy GPS Products are Now Available To The Public

- http://www.brickhousesecurity.com/

Linux Man Pages

- http://linuxmanpages.com/

coreboot / BIOS related

- http://www.coreboot.org/

SeaBIOS @ coreboot

- http://www.coreboot.org/SeaBIOS

SeaBIOS

- http://www.seabios.org/SeaBIOS

Detecting Kernel Rootkits

- http://la-samhna.de/library/rootkits/detect.html

DNSCrypt

- https://www.opendns.com/technology/dnscrypt/

Dedoimedo offers detailed, step-by-step tutorials on a wide range of computer-related topics, including operating system installation guides and reviews, security tips and tricks, virtualization, general computing, and more, all accompanied by screenshots and tons of examples. There's something for everyone, from newbies to experts.

- http://dedoimedo.com/

I2P Anonymous Network

- http://www.i2p2.de/

Lynis - Security and system auditing tool for Linux

- http://www.rootkit.nl/projects/lynis.html

MI5 - The Security Service

The Security Service (MI5) is a British intelligence agency working to protect the UK's national security against threats such as terrorism and espionage.

- https://www.mi5.gov.uk/

Microsoft Safety Scanner

Do you think your PC has a virus? The Microsoft Safety Scanner is a free downloadable security tool that provides on-demand scanning and helps remove viruses, spyware, and other malicious software. It works with your existing antivirus software. Note: The Microsoft Safety Scanner expires 10 days after being downloaded. To rerun a scan with the latest anti-malware definitions, download and run the Microsoft Safety Scanner again.

Qubes is an open source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers. In the future it might also run Windows apps. by Joanna Rutkowska

TLD is an award-winning, real-time algorithm for tracking of unknown objects in video streams. The object of interest is defined by a bounding box in a single frame. TLD simultaneously Tracks the object, Learns its appearance and Detects it whenever it appears in the video. The result is a real-time tracking that typically improves over time. Due to its learning abilities, TLD has been advertised under name Predator

- http://info.ee.surrey.ac.uk/Personal/Z.Kalal/tld.html

Top Secret America | washingtonpost.com

Washington Post reporters Dana Priest and William M. Arkin's investigation of the government's response to 9/11. Top Secret America explores what they found.

Mind Justice. A nonprofit 501(c)3 human rights group working for the rights and protections of mental integrity and freedom from new technologies and weapons which target the mind and nervous system. Formed to stop nonconsensual experimentation by the U.S. and other governments. Includes victims advocacy, research, legislative, legal and international remedies and public education.

- http://mindjustice.org/

bashoneliners.com, a place for practical or just pure awesome bash one-liners or shell script tips and tricks for GNU Linux, UNIX or BSD systems.

- http://www.bashoneliners.com/

Search Engine Land is a news and information site covering search engine marketing, searching issues and the search engine industry.

- http://searchengineland.com/

winsupersite.com / Microsoft Windows News

- http://www.winsupersite.com/

-- http://www.winsupersite.com/blogcontent/supersite-blog-39

----------------------------------------

** 5005: Security Blogs

SANS Computer Security News/Newsletters

- https://www.sans.org/newsletters/

-- https://www.sans.org/newsletters/#newsbites

-- https://www.sans.org/newsletters/#risk

-- https://www.sans.org/newsletters/#ouch

ReversingLabs has been founded with the goal to provide the best file analysis tools and the best software protection tools. Our expertise in building superior software reversing tools, gives ReversingLabs a unique background for creating superior software protection tools. Reverse Engineering is an Art where the most complex protection schemas are the least publicly available. Our tools enable the security industry, governments and research institutions to rapidly and effectively reduce the spread of malware.

Network IT security hardware purchases can be costly...be sure to do your research with eWeek and get the Security you need. The latest IT security news, insight, analysis and product reviews covering network security, Anti Spam and Anti Virus. Coverage includes topics such as Network Access Control (NAC), botnets, phishing, wireless network security hardware, computer network security, data security, malware and the latest security trends.

TheHiddenEvil.com - This website is devoted to explaining a global program of torture, murder & persecution which the webmaster calls the Hidden Evil. It includes a vast network of plain-clothed citizen informants, which is used for public stalking, & the use of Directed Energy Weapons on targeted individuals. All core factions of the community are involved, & everyone, from seniors to children, participates in Gang Stalking. Governments have used these groups in some form since the Roman Empire. The Hidden Evil is an example of this pattern repeating itself. (Book and Blog)

Global defence forum on topics for military aviation, air force, army, navy, missiles, defense technology, space and nuclear forces as well as post military pictures and videos. Discuss world security issues in areas such as war on terror, piracy and nuclear weapons threats.